ETRI-Knowledge Sharing Plaform

KOREAN

Researchers

연구자 검색
Keyword

Detail

사진

Jin Seung Hun
Department
AI Data Security Research Section
Contact
KSP Keywords
논문 검색결과
Type Year Title Cited Download
Conference
2024 An Integrated Perspective on the Definition of AI Security   진승헌   한국정보기술학회 종합 학술 대회 (추계) 2024, pp.123-126
Conference
2024 A Study on Mapping Digital Identities between EU and US   진승헌   한국정보기술학회 종합 학술 대회 (하계) 2024, pp.91-95
Journal
2024 EU eIDAS 2.0 & European Digital Identity Wallet   진승헌   TTA Journal, v.211, pp.90-95
Conference
2023 Evolution of digital wallets and consideration of security threats   진승헌   한국정보보호학회 학술 대회 (하계) 2023, pp.1-4
Journal
2022 Review for ID management technology according to Metaverse phase   정수용  정보보호학회지, v.32, no.4, pp.49-59
Conference
2022 A Study on Metaverse Security Threats   진승헌   한국정보보호학회 학술 대회 (하계) 2022, pp.699-702
Conference
2021 Major Issues and Implications for 20 Years of Accredited Certificate   진승헌   한국정보기술학회 종합 학술 대회 (추계) 2021, pp.16-20
Journal
2021 World Without Boundaries and Trends in User Authentication Technology   진승헌   전자통신동향분석, v.36, no.4, pp.135-144
Conference
2021 Analysis of Digital ID Management Technology Requirements for the Post-COVID-19 Er   진승헌   한국정보기술학회 종합 학술 대회 (하계) 2021, pp.24-28
Journal
2020 Trends of Digital Identity Technology   진승헌   주간기술동향, v.1975, pp.2-13
Journal
2020 Is Your Android App Insecure? Patching Security Functions With Dynamic Policy Based on a Java Reflection Technique   Sung-Hoon Lee   IEEE Access, v.8, pp.83248-83264 4
Journal
2019 Mobile Network Security Issues regarding 5G Security   박종근   전자통신동향분석, v.34, no.1, pp.36-48
Conference
2018 AppWrapper: Patching Security Functions with Dynamic Policy on Your Insecure Android Apps   Sung-Hoon Lee   International Symposium on Software Reliability Engineering Workshops (ISSREW) 2018, pp.36-41 2
Journal
2018 Detection of Spoofing Attacks in Face Recognition   이성훈   주간기술동향, v.1870, pp.17-26
Conference
2018 Learning based Biometric Key Generation Method using CNN and RNN   Jong-hyuk Roh   International Conference on Information Technology and Electrical Engineering (ICITEE) 2018, pp.136-139 11
Journal
2018 Feature Subset for Improving Accuracy of Keystroke Dynamics on Mobile Environment   Sung-Hoon Lee   Journal of Information Processing Systems, v.14, no.2, pp.523-538 9
Journal
2018 Trends in Implicit Continuous Authentication Technology   김승현   전자통신동향분석, v.33, no.1, pp.57-67
Conference
2017 Appwrapping Providing Fine-Grained Security Policy Enforcement Per Method Unit in Android   Sung-Hoon Lee   International Symposium on Software Reliability Engineering Workshops (ISSREW) 2017, pp.36-39 4
Journal
2017 Constructing a Privacy-Protecting Fingerprint-Template Based on a Combination of Encryption   김형균   한국정보기술학회논문지, v.15, no.10, pp.45-53
Conference
2017 A Study of Adaptive Feature Subset for Improving Accuracy of Keystroke Dynamics Authentication on Mobile Environment   이성훈  한국정보처리학회 학술 발표 대회 (춘계) 2017, pp.287-290
Journal
2017 모바일 보안 관리 기술 소개 및 동향   이성훈   주간기술동향, v.1791, pp.2-12
Journal
2017 Simplified Small Exponent Test for Batch Verification   Jung Yeon Hwang   Theoretical Computer Science, v.662, pp.48-58 11
Conference
2016 A Study of App Wrapping for Repackaging Android Binary Application   이성훈   한국정보보호학회 학술 대회 (동계) 2016, pp.1-4
Conference
2016 Efficient Fuzzy Key Extraction Method with Lighted Template   김형균   한국정보보호학회 학술 대회 (동계) 2016, pp.1-4
Conference
2016 A Study on Feature of Keystroke Dynamics for Improving Accuracy in Mobile Environment   Sung-Hoon Lee   World Conference on Information Security Applications (WISA) 2016 (LNCS 10144), v.10144, pp.1-10 2
Journal
2016 핀테크 보안 기술 동향 : 상황 인지 기반 인증 기술   김승현   정보과학회지, v.34, no.4, pp.20-24
Conference
2015 Robust Authenticated Key Exchange Using Passwords and Identity-Based Signatures   Jung Yeon Hwang   International Conference on Security Standardisation Research (SSR) 2015, v.9497, pp.43-69 4
Journal
2015 Customer Data Scanner for Hands-Free Mobile Payment   SooHyung Kim   IEICE Transactions on Communications, v.E98-B, no.11, pp.2291-2299 0
Journal
2015 Study on Fintech Technology and Its Security   이성훈   전자통신동향분석, v.30, no.4, pp.110-119
Journal
2015 An Attack of Defeating Keyboard Encryption Module using Javascript Manipulation in Korean Internet Banking   이성훈   정보보호학회논문지, v.25, no.4, pp.941-950
Conference
2015 Accurate Indoor Proximity Zone Detection Based on Time Window and Frequency with Bluetooth Low Energy   Dae-Yeob Kim   International Conference on Mobile Systems and Pervasive Computing (MobiSPC) 2015, pp.88-95
Conference
2014 Risk of Personal Information for the Sale of Used Goods in the Online   박준범   한국정보처리학회 학술 발표 대회 (추계) 2014, pp.482-485
Journal
2014 Passwordless Authentication Technology-FIDO   조상래   전자통신동향분석, v.29, no.4, pp.101-109
Conference
2014 Implementation of TouchSign Certificate Management System   조상래   대한전자공학회 종합 학술 대회 (하계) 2014, pp.598-601
Conference
2014 Implementation of TouchSign Online System   김수형   대한전자공학회 종합 학술 대회 (하계) 2014, pp.595-597
Conference
2014 Implementation of TouchSign Offline Digital Signature System   조영섭   대한전자공학회 종합 학술 대회 (하계) 2014, pp.602-605
Conference
2014 The Effective De-Identification using Quasi-Identifier in the Relational Database   박준범   한국정보보호학회 학술 대회 (하계) 2014, pp.1-4
Conference
2014 The Research on iBeacon Technology Trend and Issue   김대엽   한국 컴퓨터 종합 학술 대회 2014, pp.390-392
Conference
2014 Device Control Protocol Using Mobile Phone   Jong-hyuk Roh   International Conference on Advanced Communication Technology (ICACT) 2014, pp.355-359 14
Journal
2013 A Method of Identifying Ownership of Personal Information Exposed in Social Network Service   김석현   정보보호학회논문지, v.23, no.6, pp.1103-1110
Conference
2013 Geo-Location based QR-Code Authentication Scheme to Defeat Active Real-time Phishing Attack   Seung-Hyun Kim   Workshop on Digital Identity Management (DIM) 2013, pp.51-61 9
Conference
2013 A Method to Convert Formalized Hangul Name of Informal User Name   김석현   한국정보과학회 학술 발표회 (추계) 2013, pp.799-801
Conference
2013 Named Entity Recognition with Automatically Gathered Training Data   조진만   한국정보과학회 학술 발표회 (추계) 2013, pp.772-774
Conference
2013 Privacy Protection Technology for Public Information Open & Sharing   최대선   한국정보과학회 학술 발표회 (추계) 2013, pp.775-777
Conference
2013 Connecting Same ID in the Facebook and Twitter   박준범   한국정보과학회 학술 발표회 (추계) 2013, pp.778-780
Journal
2013 Personal Information Exposure on Social Network Service   최대선   정보보호학회논문지, v.23, no.5, pp.977-983
Journal
2013 금융 기관을 타켓으로 하는 피싱/파밍 공격 기술 동향   김승현   전자공학회지, v.40, no.8, pp.40-48
Journal
2013 Privacy Risk Analysis of Big Data   최대선   정보보호학회지, v.23, no.3, pp.56-60
Journal
2013 Warning System for Detecting Malicious Applications on Android System   Sung-Hoon Lee   International Journal of Computer and Communication Engineering, v.2, no.3, pp.324-327
Journal
2013 Active Phishing Attack and Its Countermeasures   김승현   전자통신동향분석, v.28, no.3, pp.9-18
Journal
2013 Mobile Electronic Receipt   김수형   TTA Journal, v.146, pp.57-60
Journal
2012 Smart Channel : A Method for Processing Transactions in Smartphone for Authentication, Payment and Digital Signature in N-Device Environment   최대선   정보과학회논문지 : 정보통신, v.39, no.6, pp.506-513
Conference
2012 A Study on Audio Security Storage System and Method for Managing Certificate Using this System   김석현   한국인터넷정보학회 학술 발표 대회 (추계) 2012, pp.141-142
Journal
2012 Survey of the Technologies for Collection of PII   김승현   전자통신동향분석, v.27, no.4, pp.130-137
Conference
2012 User Movement Behavior Analysis using the Environment Information   노종혁   한국통신학회 종합 학술 발표회 (하계) 2012, pp.321-322
Journal
2012 사용자 동의없는 개인정보 수집기술 동향   김승현   주간기술동향, v.1544, pp.1-14
Conference
2012 Personalized Advertisement Recommendation System based on User Profile in the Smart Phone   Jong-Hyuk Roh   International Conference on Advanced Communication Technology (ICACT) 2012, pp.1300-1303
Journal
2012 Platform-Independent Security Framework for Application Security on Smartphone Environment   최대선   정보과학회논문지 : 정보통신, v.39, no.1, pp.102-107
Conference
2011 Study of Securing Permission about Android Applications   이성훈   한국정보보호학회 충청 지부 학술 대회 2011, pp.1-8
Journal
2011 ID 관리 기술 국제표준화 동향 및 향후 전망   조상래   정보보호학회지, v.21, no.4, pp.14-21
Journal
2011 VRM 관련 오픈소스 프로젝트 동향   김승현   정보보호학회지, v.21, no.4, pp.47-56
Journal
2011 ID 관리 기술 및 시장 동향   조영섭   정보보호학회지, v.21, no.4, pp.62-68
Conference
2011 Bar-Code Waybill of Personal Information is Encrypted   김석현   한국정보처리학회 학술 발표 (춘계) 2011, pp.836-839
Conference
2011 A Study on an Alternation of RNN and Access Control for Offline Environments by using I-PIN   김승현   한국정보처리학회 학술 발표 (춘계) 2011, pp.840-843
Journal
2011 ITU-T SG17 ID 관리 국제표준화 동향 및 향후 전망   조상래   정보보호학회지, v.21, no.2, pp.70-77
Journal
2011 VRM: 사용자 중심의 고객관계관리(CRM)   김승현   주간기술동향, v.1480, pp.1-12
Conference
2011 Human Verifiable Authentication Schemes Geared to Smart Wallet Applications   Gun Il Ma  International Conference on Consumer Electronics (ICCE) 2011, pp.141-142 1
Conference
2010 A Personalized Music Recommendation Service in Mobile Environment   Jong-Hyuk Roh   International Conference on Internet (ICONI) 2010 / Asia Pacific International Conference on Information Science and Technology (APIC-IST) 2010, pp.1-2
Conference
2010 Shoulder-Surfing Resistant User Authentication Method Based on PIN and Pattern Image   김영삼   한국정보처리학회 학술 대회 (추계) 2010, pp.1138-1141
Conference
2010 SRS-based Automatic Secure Device Pairing on Audio Channels   Young Sam Kim   International Conference for Internet Technology and Secured Transactions (ICITST) 2010, pp.1-6
Conference
2010 Gatekeeper   Seung-Hyun Kim   Workshop on Digital Identity Management (DIM) 2010, pp.59-62 0
Conference
2010 Study on HCI Authentication Technologies Can be Applied to the Smartphone Environment   김석현   한국인터넷정보학회 학술 발표 대회 (추계) 2010, pp.1-2
Conference
2010 Personalized Service Recommendation System in Mobile Environment   노종혁   한국인터넷정보학회 학술 발표 대회 (추계) 2010, pp.1-2
Journal
2010 Personalized EigenTrust with the Beta Distribution   Daeseon Choi   ETRI Journal, v.32, no.2, pp.348-350 14
Conference
2010 Accountable Privacy Based on Publicly Verifiable Secret Sharing   Young Sam Kim   International Conference on Advanced Communication Technology (ICACT) 2010, pp.1583-1586
Conference
2010 A Concept of Interoperable Authentication Framework for Dynamic Relationship in Identity Management   Seung-Hyun Kim   International Conference on Advanced Communication Technology (ICACT) 2010, pp.1635-1639
Journal
2009 모바일 ID 보안 및 프라이버시를 위한 스마트지갑   최대선   정보과학회지, v.27, no.12, pp.50-59
Journal
2009 Digital Identity Interchange Gateway Technology for Mobile Services   조상래   전자통신동향분석, v.24, no.5, pp.133-142
Journal
2009 모바일 ID관리와 스마트지갑   최대선   주간기술동향, v.1415, pp.14-28
Conference
2009 Digital ID Wallet: Provide Selective Disclosure and Users Control of Identity Information   Seung Hyun Kim   International Conference on Security and Management (SAM) 2009, pp.457-462
Conference
2009 Personal Information Management using Attribute Provider   Jong Hyuk Roh   International Conference on Advanced Communication Technology (ICACT) 2009, pp.1293-1295
Journal
2009 해외의 대규모 OpenID 도입 사례   김승현   주간기술동향, v.1384, pp.1-14
Conference
2009 Identity Data Security System for the Digital Identity Wallet   Dae Seon Choi   International Conference on Advanced Communication Technology (ICACT) 2009, pp.1678-1681
Journal
2008 A Digital Identity Interchange Framework for User-Centric ID Management   조상래   전자통신동향분석, v.23, no.6, pp.102-111
Conference
2008 A Simple SNMP Authentication Method for Ad-hoc Networks   Hyun Kyung Oh   International Conference on Convergence and Hybrid Information Technology (ICCIT) 2008, pp.555-558 1
Conference
2008 Mobile Digital Identity Wallet   김수형   한국정보처리학회 학술 발표 대회 (추계) 2008, pp.1489-1492
Conference
2008 A Relay Technique to interoperate between i-PIN(internet Personal Identification Number) services   김승현   한국정보처리학회 학술 발표 대회 (추계) 2008, pp.1481-1484
Journal
2008 Efficient and Secure Self-Organized Public Key Management for Mobile Ad Hoc Networks   Dae Seon Choi   IEICE Transactions on Communications, v.E91-B, no.11, pp.3574-3583 1
Conference
2008 i-PIN(internet Personal Identification Number) extension services using the Identity Selector   김승현   한국정보처리학회 학술 발표 대회 (추계) 2008, pp.1477-1480
Conference
2008 A User-centric Federated Single Sign-on System using Mobile Device and Temporary Identification   정관수   정보통신분야학회 합동 학술 대회 2008, pp.1-4
Conference
2008 Data Sharing in the Digital Identity Wallet   노종혁   한국정보처리학회 학술 발표 대회 (추계) 2008, pp.1521-1524
Conference
2008 A Method for User Authentication using One-time Identification Information and Mobile Device   정관수   한국통신학회 종합 학술 발표회 (추계) 2008, pp.691-694
Journal
2008 디지털 ID 관리 기술 동향 및 전망   조영섭   인터넷정보학회지, v.9, no.3, pp.14-24
Journal
2008 피싱과 안티피싱 기술의 동향   김덕진   주간기술동향, v.1362, pp.1-12
Journal
2008 Electronic Identity Wallet System to Provide User-Centric ID Management Facilities   조영섭   전자통신동향분석, v.23, no.4, pp.10-18
Journal
2008 인터넷 개인 정보 유출과 전자ID지갑   최대선   주간기술동향, v.1359, pp.10-23
Journal
2008 국내외 ID 관리 기술 표준화 동향   조상래   주간기술동향, v.1355, pp.13-25
Journal
2008 사용자 중심의 ID관리 프로젝트 동향   김승현   주간기술동향, v.1354, pp.1-13
Conference
2008 Decision Assistant Model for the Identity Selector in User-Centric IdM   Seung-Hyun Kim   International Conference on Security and Management (SAM) 2008, pp.1-7
Conference
2008 Website Registration using Link for Privacy   Jong-Hyuk Roh   International Conference on Security and Management (SAM) 2008, pp.1-3
Conference
2008 A User Friendly Internet Identity Management System   Dae Seon Choi   International Conference on Advanced Communication Technology (ICACT) 2008, pp.1163-1166 2
Conference
2008 Context-Aware Service System Architecture based on Identity Interchange Layer   Soo-Hyung Kim   International Conference on Advanced Communication Technology (ICACT) 2008, pp.1482-1486 1
Conference
2008 Personalized Identity Agent for User-Centric IdM   Seung-Hyun Kim   International Conference on Advanced Communication Technology (ICACT) 2008, pp.1308-1313 2
Conference
2008 The Security Limitations of SSO in OpenID   Hyun-Kyung Oh   International Conference on Advanced Communication Technology (ICACT) 2008, pp.1608-1611 30
Journal
2007 Policy Based Privacy Technology in Web Environment   노종혁   전자통신동향분석, v.22, no.4, pp.144-155
Journal
2007 Privacy Controller using XACML for Internet Identity Management System   노종혁   한국통신학회논문지 B : 네트워크 및 서비스, v.32, no.7, pp.438-447
Journal
2007 url-based Identity Management 기술 동향   최대선   주간기술동향, v.1303, pp.12-24
Conference
2007 Identity Roaming Mechanism for Multiple Trust Domains using SAML v2.0 and Single Federation Bridge   Sang Rae Cho   International Symposium on Consumer Electronics (ISCE) 2007, pp.1-4 1
Conference
2007 Trust Management for User-Centric Identity Management on the Internet   Dae Seon Choi   International Symposium on Consumer Electronics (ISCE) 2007, pp.1-4 2
Conference
2007 Usability Enhanced Privacy Protection System Based on Users' Responses   Han-Gyu Ko   International Symposium on Consumer Electronics (ISCE) 2007, pp.1-6 4
Conference
2007 Video-on-Demand Streaming in P2P Environment   Jong-Hyuk Roh   International Symposium on Consumer Electronics (ISCE) 2007, pp.1-5 3
Journal
2007 Overview and Comparison of Internet Identity Management System   조영섭   전자통신동향분석, v.22, no.3, pp.136-143
Journal
2007 오픈소스 ID관리 프로젝트 동향   김승현   주간기술동향, v.1301, pp.1-10
Journal
2007 Technologies for Identity Metasystem   김수형   전자통신동향분석, v.22, no.3, pp.144-153
Conference
2007 A Unified User Consent Acquisition and Delivery Mechanism for Multi-Source User Data Integrated Service   Young Seob Cho   International Symposium on Consumer Electronics (ISCE) 2007, pp.1-7 0
Conference
2007 Design and Implementation of Mobile User Agreement Service   Seung-Hyun Kim   International Symposium on Consumer Electronics (ISCE) 2007, pp.1-6 0
Conference
2007 The Weakness Analysis of User-centric based Identity Management System   오현경  한국인터넷정보학회 학술 발표 대회 (춘계) 2007, pp.123-127
Journal
2007 ID Management Technology and Standards   조영섭   정보과학회지, v.25, no.5, pp.22-28
Conference
2007 The Real-Time User Consent Acquisition System for Secure Use of Personal Information   Han Gyu Ko  International Conference on Advanced Communication Technology (ICACT) 2007, pp.1343-1346 1
Journal
2007 Trend of Technology for Digital Identity Management   조영섭   전자통신동향분석, v.22, no.1, pp.1-10
Conference
2007 Security-Enhanced Callback URL Service in Mobile Device   Seung-Hyun Kim   International Conference on Advanced Communication Technology (ICACT) 2007, pp.1500-1504 3
Conference
2006 Effective E-mail Address Anonymization System using Identity Service Provider   Hangyu Ko   International Ubiquitous Convergence Conference (IUC) 2006, pp.1-5
Journal
2006 인터넷 환경의 사용자 중심 ID 관리 시스템 연구 동향   이형효  정보과학회지, v.24, no.12, pp.92-98
Conference
2006 Identity Centric Management of Distributed User Created Content   Dae Seon Choi   International Ubiquitous Convergence Conference (IUC) 2006, pp.1-5
Journal
2006 신원도용(Identity Theft) 대응 기술 동향   진승헌   주간기술동향, v.1264, pp.1-13
Journal
2006 Web 2.0과 URL기반의 ID관리 기술   조상래   주간기술동향, v.1260, pp.1-12
Journal
2006 인터넷 서비스 환경의 고도화와 디지털 ID 관리 기술   진승헌   주간기술동향, v.1261, pp.24-33
Journal
2006 Internet ID Management System based on ID Federation: e-IDMS   조영섭   전자공학회논문지 TC, v.43, no.7, pp.104-114
Journal
2006 인터넷 환경에서 데이터 공유를 위한 새로운 식별체계 동향   조상래   주간기술동향, v.1255, pp.1-13
Conference
2006 E-mail Address Anonymization Service using Identity Service Provider   고한규   한국통신학회 종합 학술 발표회 (하계) 2006, pp.1535-1538
Journal
2006 유럽의 eID 기술 동향   김승현   주간기술동향, v.1251, pp.1-25
Conference
2006 A Personal Information Leakage Prevention Method on the Internet   Dae Seon Choi   International Symposium on Consumer Electronics (ISCE) 2006, pp.646-650 4
Conference
2006 Grid ID Management based on Distributed Agents using SPML   Seung Hyun Kim   International Symposium on Consumer Electronics (ISCE) 2006, pp.604-609 0
Conference
2006 Web Service Framework for Identity Information Sharing   조영섭   대한전자공학회 종합 학술 대회 (하계) 2006, pp.427-428
Conference
2006 The Identity Web : Trend and Security Requirements   조상래   대한전자공학회 종합 학술 대회 (하계) 2006, pp.435-436
Journal
2006 OASIS SAML(Security Assertion Markup Language) v2.0 고찰 및 응용   조영섭   한국멀티미디어학회지, v.10, no.1, pp.59-70
Conference
2006 Virtual Route Scheme for Preventing Authentication Bypass in the WWW Environment   Seung Hyun Kim   International Conference on Advanced Communication Technology (ICACT) 2006, pp.822-827 1
Conference
2006 A Method for Preventing the Leakage of the Personal Information on the Internet   Dae Seon Choi   International Conference on Advanced Communication Technology (ICACT) 2006, pp.1195-1198 4
Journal
2006 Key Management Scheme for Providing the Confidentiality in Mobile Multicast   노종혁   정보보호학회지, v.16, no.1, pp.97-104
Conference
2006 Topology-Aware Key Management Scheme for Secure Overlay Multicast   Jong-Hyuk Roh   International Conference on Information Networking (ICOIN) 2006 (LNCS 3961), v.3961, pp.733-742 0
Conference
2005 A Technique for Blocking Personal Information Leakage in the Internet   최대선   차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.356-359
Conference
2005 Key Tree Management for Providing the Confidentiality in Overlay Multicast   노종혁   한국정보보호학회 학술 대회 (동계) 2005, pp.1-5
Conference
2005 Privilege Delegation Technology using a Delegation Assertion based on Identity Federation   조상래   차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.350-352
Conference
2005 Consideration of the Compatible Federation Protocols in Heterogeneous Federation Environments   김승현   차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.8-12
Conference
2005 Federation Protocol Translation Service in Heterogeneous Federation Environments   김승현   한국정보보호학회 학술 대회 (동계) 2005, pp.1-4
Conference
2005 Liberty ID-WSF Technology for Identity Web Service   조영섭   차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.323-327
Conference
2005 Key Management Scheme for Application Layer Multicast   노종혁   차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.364-368
Conference
2005 Key Management Scheme for Secure Mobile Multicast   노종혁   한국정보과학회 학술 발표 (추계) 2005, pp.106-108
Conference
2005 Key Management Scheme for Secure Overlay Multicast   노종혁   한국통신학회 종합 학술 발표회 (추계) 2005, pp.775-778
Journal
2005 편리하고 안전한 인터넷 이용을 위한 ID 관리 서비스   진승헌   ETRI CEO Information, v.알수없음, no.31, pp.1-19
Journal
2005 Design and Implementation of Scalable ID Federation System in Mobile Computing Environments   유인태   인터넷정보학회논문지, v.6, no.5, pp.155-166
Journal
2005 Privacy Authorization for Internet Identity Management System   노종혁   한국통신학회논문지, v.30, no.10B, pp.648-659
Journal
2005 Cluster-Based Trust Evaluation Scheme in an Ad Hoc Network   Seung Hun Jin   ETRI Journal, v.27, no.4, pp.465-468 38
Journal
2005 Internet Identity Management Service   최대선   전자통신동향분석, v.20, no.1, pp.73-83
Conference
2004 Multicast in Mobile Network   노종혁   차세대 통신소프트웨어 학술 대회 (NCS) 2004, pp.745-748
Journal
2004 인터넷 ID 관리 서비스 기술 동향   김승현   주간기술동향, v.1160, pp.1-7
Journal
2004 인터넷 ID 관리 서비스   최대선   정보보호학회지, v.14, no.5, pp.32-43
Conference
2004 Authentication and Authorization Service for Network Security System   김태성   한국정보처리학회 학술 발표 대회 (춘계) 2004, pp.1137-1140
Journal
2004 Self-Reputation System in P2P Networks   조남수   정보보호학회논문지, v.14, no.2, pp.35-47
Journal
2004 유비쿼터스 컴퓨팅과 보안요구사항 분석   조영섭   정보보호학회지, v.14, no.1, pp.21-34
Conference
2003 Certificate Status Check for Verifying Signature   노종혁   한국통신학회 종합 학술 발표회 (추계) 2003, pp.588-591
Journal
2003 Design of Privilege Delegation Mechanism using Proxy Certificate   진승헌   정보처리학회논문지 C, v.10C, no.6, pp.739-746
Conference
2003 A Location Privacy Protection Mechanism for Smart Space   Yeong Sub Cho   International Workshop on Information Security Applications (WISA) 2003 (LNCS 2908), v.2908, pp.162-173 5
Journal
2003 정보 보호 관련 법규 동향   이대기   전자공학회지, v.30, no.6, pp.87-96
Conference
2003 On Modeling System-centric Information for Role Engineering   Dong Wan Shin  Symposium on Access Control Models and Technologies (SACMAT) 2003, pp.169-178 17
Journal
2003 ID-based Proxy Signature Scheme from the Bilinear Map   이정연   정보보호학회논문지, v.13, no.2, pp.3-11
Conference
2003 Research for Implementation of Licensed Web SSO   최대선   한국정보과학회 학술 발표 (봄) 2003, pp.452-454
Conference
2003 Certificate-based Digital Library Authentication and Authorization Architecture   원형석   한국정보과학회 학술 발표 (봄) 2003, pp.494-497
Conference
2003 A role administration system in role-based authorization infrastructures   Dong Wan Shin  Symposium on Applied Computing (SAC) 2003, pp.325-330 0
Conference
2002 Validating Certificate of Certificate Validation Server   노종혁   한국정보처리학회 학술 발표 대회 (추계) 2002, pp.913-916
Conference
2002 A study on a digital library authentication and authorization architecture   원형석   한국정보처리학회 학술 발표 대회 (추계) 2002, pp.1103-1106
Conference
2002 A SAML-based SSO and B2B   진승헌   한국정보처리학회 학술 발표 대회 (추계) 2002, pp.961-964
Journal
2002 통합 어플리케이션 정보보호 기반구조   최대선   정보보호학회지, v.12, no.5, pp.27-35
Conference
2002 TSP SDK Implementation   원형석   한국정보과학회 학술 발표 (가을) 2002, pp.589-591
Conference
2002 Proxy Signature Technology using Proxy Certificate   조상래   한국정보과학회 학술 발표 (가을) 2002, pp.676-678
Conference
2002 Building Certification Paths in Certificate Validation Server   노종혁   한국정보과학회 학술 발표 (가을) 2002, pp.604-606
Conference
2002 Introduction of ETRI Privilege Management Infrastructure   김희선   한국정보과학회 학술 발표 (가을) 2002, pp.607-609
Conference
2002 Design & Implementation of Binding method for PKC & AC   진승헌   한국정보과학회 학술 발표 (가을) 2002, pp.679-681
Conference
2002 The Design of Integrated Cryptographic API   김태성   한국정보과학회 학술 발표 (가을) 2002, pp.505-507
Conference
2001 Collaborative VA Model   노종혁   한국정보과학회 학술 발표 (가을) 2001, pp.751-753
Conference
2001 The Mechanism of Certification Path Validation   김태성   한국정보처리학회 학술 발표 대회 (추계) 2001, pp.931-934
Journal
2001 국내외 전자 서명 및 인증 제도 동향 분석   이대기   정보보호학회지, v.11, no.4, pp.44-60
Conference
2001 Attribute Certificate and PMI Model   조영섭   한국통신학회 종합 학술 발표회 (하계) 2001, pp.1933-1936
Journal
2000 Attribute Certification Technology and PMI   진승헌   정보보호학회지, v.10, no.4, pp.33-40